Answer:
I probably won't awnser them all but I'll try my best
Explanation:
Hacking is a breach of privacy online usually caused by some kind of malware injected into your device there's multiple types of this program or files malware which simply damages and harms your device. A Trojan horse is a program which tricks you by selling you a fake product which has code in it which has code which gives the hacker remote access to your device this program is usually free and masked like a crack or patch of a certain program. U got the second an third question with this one so u can just divide it into pieces. Piracy is Hacking but this time the hacker is stealing ur information through the malware. Invasion of privacy can have multiple forms online and offline. Online intrusion is when a service gives out information you entrust to it while off line Intrusion is stalking trespassing blackmail etc.
<u>Active Directory</u> consist of many users and their information.
Answer:
Print Layout, Full-Screen Reading, Web Layout, Outline, and Draft are 5 different views in Word.
Hope this helps!
Answer:
B) Worksheet
Explanation:
In Microsoft Excel and all the other spreadsheet applications, a worksheet is a file that contains cells, the cells are an intersections of rows and columns, and it provides the interface where the users can input and modify data, because of the row/column nature of worksheets, a table structure can easily be developed for the organization of data/information from where they can be plotted to a chart. Hence every chart has a corresponding worksheet containing its numerical data.
The OS shell allows access to the operating system services